Enterprises Held Hostage – The List of Demands Is Short…

Matt Keil


ANALYSIS – New rank and file employees entering the work force may demand access to social networking sites, wikis, IM and such as part of their employment package.

“We’ll have to deal with the reality of people coming in and using tools that aren’t in the firewall,” said De Beer [of IDC]. “Web 2.0 empowers users beyond creating content. It’s about how we interact. For the next generation, it will be about mass collaboration, using social networking.”

The key point in this article is that many new applications falling into the Web 2.0 or Enterprise 2.0 bucket cannot be detected by a traditional firewall which means some other means of security needs to be implemented to adequately secure these new applications.

Click here to view the Information Week article.

Got something to say?

Get updates: Unit 42

Sign up to receive the latest news, cyber threat intelligence and research from Unit42


SUBSCRIBE TO RSS